官术网_书友最值得收藏!

What you need for this book

To follow and recreate the recipes of this book, you will need two systems. One can be your pen-testing system and the other can be your target. Alternatively, you can also work with a single system and set up a penetration testing environment by using any virtualization software.

Apart from that you will require an ISO image of BackTrack 5 which has pre-installed Metasploit and other tools that we will be discussing in this book. Alternatively, you can download the Metasploit framework separately for your preferred operating system from its official website.

主站蜘蛛池模板: 临夏市| 中牟县| 长沙市| 平原县| 大名县| 福清市| 尼木县| 海林市| 高台县| 佳木斯市| 尼木县| 定州市| 昌邑市| 渝北区| 喀喇沁旗| 沂水县| 上杭县| 饶平县| 凌海市| 宁远县| 巧家县| 鸡泽县| 静乐县| 木兰县| 辉县市| 长治市| 扎赉特旗| 永定县| 兰考县| 常山县| 宜都市| 洛川县| 铅山县| 府谷县| 义马市| 伊宁市| 江西省| 子长县| 濉溪县| 犍为县| 延庆县|